Abstract is missing.
- Cookie Based Protocol to Defend Malicious Browser ExtensionsJustin Joseph, Saumya Bhadauria. 1-6 [doi]
- Fingerprint Presentation Attack Detection: Multispectral imaging with a narrow-band camera using Bag of FeaturesInes Goicoechea-Telleria, Kiyoshi Kiyokawa, Anas Husseis, Judith Liu-Jimenez, Raul Sánchez-Reillo. 1-6 [doi]
- Modern security threats in the Internet of Things (IoT): Attacks and CountermeasuresGowthamaraj Rajendran, R. S. Ragul Nivash, Purushotham Parthiban Parthy, S. Balamurugan 0001. 1-6 [doi]
- Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and TaxonomyIman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, Ali A. Ghorbani 0001. 1-8 [doi]
- Securing GOOSE: The Return of One-Time PadsKwasi Boakye-Boateng, Arash Habibi Lashkari. 1-8 [doi]
- Template protection approaches: Fuzzy Vault schemeWendy Ponce-Hernandez, Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Judith Liu-Jimenez. 1-5 [doi]
- Effectiveness in the Realisation of Speaker AuthenticationHeinz Hertlein, Aladdin M. Ariyaeeinia, Zoe Jeffrey, Soodamani Ramalingam. 1-5 [doi]
- Secure Authentication for ATM transactions using NFC technologyDivyans Mahansaria, Uttam Kumar Roy. 1-5 [doi]
- Controller Monitoring System In Software Defined Networks Using Random Forest AlgorithmK. Kirutika, V. Vetri Selvi, Ranjani Parthasarathi, G. Subrahmanya V. R. K. Rao. 1-6 [doi]
- Forest Monitoring System through RFID and Tensorflow Object DetectionRishu Raj, Soumya Michael, D. Femi. 1-4 [doi]
- Automated Toll Collection System Based on RFID SensorSabbir Ahmed, Tamkin Mahmud Tan, Anna Mary Mondol, Zawad Alam, Noshin Nawal, Jia Uddin. 1-3 [doi]
- Identification and prevention of social engineering attacks on an enterprisePurushotham Parthiban Parthy, Gowthamaraj Rajendran. 1-5 [doi]
- Implications of the Method of Construction of UK Number Plates for Infrared Reflectance and Camera Settings on ANPR SystemMichael Rhead, Soodamani Ramalingam, Robert Gurney, William E. Martin, Andrew Jones. 1-5 [doi]
- A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud ComputingK. B. Sarmila, S. V. Manisekaran. 1-6 [doi]
- Wrist Vascular Biometric Capture Using a Portable Contactless SystemRaul Garcia-Martin, Raul Sánchez-Reillo, J. Enrique Suarez Pascual. 1-6 [doi]
- Extensible Android Malware Detection and Family Classification Using Network-Flows and API-CallsLaya Taheri, Andi Fitriah Abdul Kadir, Arash Habibi Lashkari. 1-8 [doi]
- Generating Off-line and On-line Forgeries from On-line Genuine SignaturesMiguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Réjean Plamondon. 1-6 [doi]
- Software Implementation of an Automatic Movable Road BarrierRoopa Ravish, Varun R. Gupta, K. J. Nagesh, Amruth Karnam, Shanta Rangaswamy. 1-6 [doi]
- Ergodic Secrecy Capacity in Nakagami-m Fading ChannelsShilpa Thakur, Ajay Singh. 1-3 [doi]
- A novel data ciphering method for secure cloud storageB. Lavanya, V. ThamizhThendral. 1-6 [doi]
- HPAKE: Hybrid Precocious Authentication and Key Establishment in IoTM. G. Padmashree, J. S. Arunalatha, K. R. Venugopal 0001. 1-6 [doi]
- WC-PAD: Web Crawling based Phishing Attack DetectionT. Nathezhtha, Sangeetha Dhamodaran, Vaidehi Vijayakumar. 1-6 [doi]
- Image Specific Similar Target Detection in Aerial Images Using Gaussian Mixture ModelN. Divya. 1-5 [doi]
- Novel privacy preserving system for Cloud Data security using Signature Hashing AlgorithmT. A. Mohanaprakash, J. Andrews. 1-6 [doi]
- A Survey in Presentation Attack and Presentation Attack DetectionAnas Husseis, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sánchez-Reillo. 1-13 [doi]
- Reconfigurable Architecture to Speed-up Modular ExponentiationK. Venkatesh, K. Pratibha, Suganya Annadurai, Lakshmi Kuppusamy. 1-6 [doi]
- Face Image Analysis in Mobile Biometric Accessibility EvaluationsBarbara Corsetti, Raul Sánchez-Reillo, Richard M. Guest, Marco Santopietro. 1-5 [doi]
- Influence of hypoxia on the stability of the dynamic biometric signatureVladimir Smejkal, Boris Oniscenko, Jindrich Kodl, Petr Tesar. 1-6 [doi]
- Using finger for touchscreen devices; is it safe?Atieh Merikh Nejadasl, Mahmoud Chizari. 1-3 [doi]
- Role of Bio-Inspired Algorithms for Designing Protocols in MANET-ReviewLucindia Dupak, Subhasish Banerjee. 1-6 [doi]
- HRF (HTTP Request Filtering): A New Detection Mechanism of EDoS Attack on CloudBobba Basaveswara Rao, Suneetha Bulla, Gangadhara Rao Kancherla, K. Chandan. 1-7 [doi]
- Android Device or a Privacy Compromise?K. Shruthi, P. S. Chinmayi. 1-6 [doi]
- Host-based Forensic Artefacts of Botnet InfectionManthan Prajapati, Dharmesh Dave. 1-4 [doi]
- Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble TechniqueS. Abijah Roseline, A. D. Sasisri, S. Geetha 0001, C. Balasubramanian. 1-6 [doi]
- Patterns of Life Visualiations for Intelligence Analysis: Exploring Animation with POLARSimon Attfield, Nallini Selveraj, Neesha Kodagoda, Peter J. Passmore, Elke Dunke. 1-6 [doi]
- Effects of Time on Task, Breaks, and Target Prevalence on Screener Performance in an X-ray Image Inspection TaskDaniela Buser, Yanik Sterchi, Adrian Schwaninger. 1-6 [doi]
- Interior Intrusion Detection SystemM. Vincent, P. Arumugam, G. Prabhakara Rao. 1-4 [doi]
- Denial of Service Detection System on various platformsDillibabu Shanmugam, Suganya Annadurai, Rajagopalan Vijayasarathy, T. Venkatesh Prasad. 1-12 [doi]
- Malware Capturing and Analysis using Dionaea HoneypotVasu Sethia, A. Jeyasekar. 1-4 [doi]